BEST PRACTICES FOR RED HAT ENTERPRISE LINUX ON SYSTEM Z

Size: px
Start display at page:

Download "BEST PRACTICES FOR RED HAT ENTERPRISE LINUX ON SYSTEM Z"

Transcription

1 BEST PRACTICES FOR RED HAT ENTERPRISE LINUX ON SYSTEM Z Brad Hinson [email protected]

2 IBM RED HAT RHEL SOE AUDIT REPORT Project Delivery Documentation Red Hat Asia Pacifc Level Bourke Street Melbourne VIC 3000

3 Trademarks Trademarked names may appear throughout this document. Rather than list the names and entities that own the trademarks or insert a trademark symbol with each mention of the trademarked name, the names are used only for editorial purposes and to the benefit of the trademark owner with no intention of infringing upon that trademark.

4 TABLE OF CONTENTS 1.Executive Summary Background Project Goal Key Assumptions High level Findings Key Recommendations Findings z/vm Configuration... 5 a)startup and Shutdown...5 b)z/vm Memory Tuning... 6 c)dasd Disk Configuration... 7 d)networking... 8 e)security Virtual Machine Sizing... 8 a)add Second Virtual CPU...9 b)swapgen Script...9 c)disable Minidisk Cache for Swap Device Red Hat Enterprise Linux Configuration...10 a)pre-emptive Support and Troubleshooting b)cpu and Memory c)networking...12 d)shutdown Standard Operating Environment a)installed Packages b)selinux c)iptables d)ssh Configuration...14 e)centralised Logging f)sysctl.conf / limits.conf...15 g)tmpfs Usage on /tmp and /var/tmp...15 h)auditd...16 i)kickstart j)netbackup Puppet Configuration a)system arch based modules...17 b)project specific configuration in base module...18 c)general puppet configuration d)minor issues Appendix a)starting up scripts...20 b)tty Terminal over IUCV c)dynamic CPU... 22

5 1.Executive Summary 1.1. Background IBM has requested Red Hat Consulting Services to undertake a review of the current Red Hat Enterprise Linux environment. The environment that was nominated for review was the Acme Application environment that is currently being migrated from Intel x86 based servers to the mainframe, z-series. The review is required to determine if the deployed environments are appropriate for IBM/Acme's requirements. This report outlines the findings of that work Project Goal The goal of the project is to review the Red Hat Enterprise Linux environment currently in place at ACME Application, with a view to highlight any concerns and make recommendations for remediation of those concerns Key Assumptions Red Hat assumes that the information provided by Acme and the outsourcing partner organisation IBM are true and accurate for their production environment High level Findings z/vm requires fine tuning Virtual Machine's sizing needs to be reviewed RHEL requires tunings Puppet configuration requires optimisations

6 2.Key Recommendations 3. Findings These findings identify areas of the installed environments that do not meet best (should this be leading practice instead of best practice?) practice. It is understood that an environment may deviate from generic best practice due the specialised requirements of the solution. Each item will be broken down into the following areas: Details: Outlines the nature of the issue Red Hat's Recommendation: Red Hat's suggestion to resolve the issue Probability: The likelihood that this item will cause a problem Impact: The impact that the item will have to the operations or security of the server. Affected Environments: Environments that were affected by the finding z/vm Configuration a) Startup and Shutdown 1. Startup script Details: There is no startup script for setting the initial action when a virtual machine guest logs on to z/vm. Red Hat's Recommendation: Create a PROFILE EXEC file on the LINUXADM user's 191/a disk, which is automatically utilized by each logged in user. This should contain the following lines: /* Profile Exec */ 'CP SET PF11 RETRIEVE FORWARD' 'CP SET PF12 RETRIEVE BACKWARD' 'CP SET RUN ON' Note that the first line must be enclosed in /* */ C-style comments. The 'CP SET RUN ON' allows the virtual machine to continue running automatically when logging into a disconnected virtual machine. Probability: High. Affects each login to a virtual machine. Impact: High. Without this startup file, a virtual machine could be paused unintentionally, causing a temporary outage with each 3270 login. 2. Virtual machine startup menu Details: The startup script discussed above can also be used to present the user with a common menu of actions at login. Red Hat's Recommendation: In the shared PROFILE EXEC mentioned above, add a menu written in REXX. A detailed sample is included in the Appendix 1. Probability: Medium. This can lower the learning curve for system administrators not familiar with the 3270 console. Additionally, with this in place, z/vm can now start the virtual machine automatically at startup without manual interaction, reducing downtime after an outage.

7 Impact: Medium. Does not affect system performance, but increases usability. 3. z/vm Shutdown Details: z/vm can signal a virtual machine to shutdown, then wait for it. This is useful when there are many systems to halt, for example when z/vm is shutdown for maintenance. The current setting is for z/vm to wait 30 seconds after signaling a virtual machine shutdown before considering the guest down. Red Hat's Recommendation: Increase this setting to at least 180 seconds (but no more than 300), to allow for middleware to shutdown gracefully. The following line should be added to the user AUTOLOG1's PROFILE EXEC startup file: 'CP SET SIGNAL SHUTDOWN 180' Probability: Low. Systems are not shutdown frequently. Impact: Low. Systems can be alternatively be shutdown manually at the console, remotely over SSH, or through the Satellite. b) z/vm Memory Tuning 1. Set memory and scheduling tunables in system configuration Details: z/vm should be configured for optimal memory usage based on the proposed system workload. This involves tuning the minidisk cache, storage pool buffer sizes, and VDISK limits. Red Hat's Recommendation: Configure minidisk cache so that it's taken from central storage instead of expanded, then limit the maximum amount. Add the following lines to the user AUTOLOG1's PROFILE EXEC: 'CP SET MDC XSTOR 0M 0M' 'CP SET MDC STORE 0M 256M' For more information on minidisk cache recommendations, see Next, configure z/vm resource management and scheduling values based on recommendations for Linux virtual machines. Add the following line to the user AUTOLOG1's PROFILE EXEC: 'CP SET SRM STORBUF ' Probability: High. Affects scheduling and memory management for all virtual machine under z/vm. Impact: High. Setting these values ensures Linux is scheduled properly under z/vm, and minidisk cache usage is optimized.

8 2. Add additional volumes for paging and spool Details: z/vm is preconfigured with only a single DASD volume for paging, and a single DASD volume for spool space. Based on the projected workload, this will not sustain the environment. Red Hat's Recommendation: Format additional DASD to be used as paging volumes, then add their labels to the CP_Owned section of SYSTEM CONFIG. Paging volumes should be equal in geometry and number of cylinders. To calculate the total number of volumes needed, add the total projected memory size for all guests, then subtract the memory size of the LPAR. Then double this number, because the z/vm paging subsystem performs optimally when its volumes are less than 50% used. Adding an additional volume for spool is optional but recommended. The current observed spool usage was high, which could prevent manual installations; however, as kickstart is used, this becomes less important. Consider adding spool if usage is above 90%. Probability: Paging: High. As Linux virtual machines are added, their memory becomes eligible for paging. z/vm must have the capacity to page these to disk. Spool: Low. Usage should be monitored and additional volumes added above 90%. Impact: High. Affects system response time, and allows z/vm to overcommit memory. 3. Increase VDISK limits Details: The default values for VDISK system and user limits may not satisfy the total VDISK required by the Linux guests. Red Hat's Recommendation: Increase the VDISK limits. In the Features section of SYSTEM CONFIG, make the following change: Vdisk, Userlim infinite, /* Maximum vdisk allowed per user */ Syslim infinite /* Maximum vdisk allowed for system */ Probability: High. Every Linux guest should be configured to have VDISK, so default limit is reached too quickly. Impact: High. Allows better swap and memory management for Linux guests. c) DASD Disk Configuration 1. Relabel system disks Details: z/vm uses a default disk label for all system disks. This could conflict with another z/vm instance on the same storage array, especially at startup. Red Hat's Recommendation: Relabel the five system disks (610RES, 610SPL, 610PAG, 610W01, and 610W02, if they exist) to something unique to each environment (i.e. B02RES, B02SPL, etc). This procedure is outlined in the following PDF: (see section 4.11 Relabeling system volumes, page 66, PDF page 86) Probability: Low. Issue can be avoided if IOCDS definition prevents one LPAR from seeing disks used in another LPAR. Impact: Medium. Only applicable at z/vm boot time, but if not properly configured, could prevent system from starting.

9 2. Use non-sequential DASD Details: Since DASD is emulated as partial storage on large real disks across multiple control units, there is the potential for channel bottleneck if sequential disks are given to a single system, including z/vm and Linux. Red Hat's Recommendation: Check with storage array vendor on whether SAN is implemented with internal striping. If not, any DASD used for Linux, or z/vm paging, should be striped across control units instead of allocated sequentially for any one purpose. Probability: Low. Most recent EMC and IBM storage arrays implement internal striping. Impact: High. Severely impacts performance as multiple DASD are contained onto a single physical disk. d) Networking Backup devices for virtual switch Details: The VSWMGMT1 virtual switch has only one OSA real device (rdev). It is not protected against external switch failure. Red Hat's Recommendation: Add a second rdev to this VSWITCH. Probability: Low. As discussed, this is currently being planned. Impact: Medium. Without multiple rdev statements, the VSWITCH is not protected against network failure. e) Security Configure hardware cryptographic assist Details: With hardware crypto, secure transaction processing is offloaded instead of handled by the IFL. This can be a big performance benefit. Crypto is configured for the LPAR, but is not configured for each virtual machine. Red Hat's Recommendation: Configure each guest to access the Crypto device. Add the following line to the virtual machine guest definition, preferably into a shared profile: 'CRYPT APVIRT' Probability: High. Initial query from guest indicated Crypto was not yet defined, while query from user MAINT showed Crypto device is available. Impact: Medium. Depending on the amount of SSL/RSA/DSA secure processing, this could free CPU cycles from the IFL, giving a higher consolidation ratio of virtual machines per LPAR Virtual Machine Sizing

10 a) Add Second Virtual CPU Details: The LPAR has four IFLs allocated, but each individual guest has only one virtual CPU defined. This limits the amount of multiprocessing for multi-threaded applications, like WebSphere. Red Hat's Recommendation: Define at least two virtual CPUs to each guest, but no more than the number of IFLs for this LPAR (four). At this time the recommended number of virtual CPUs is two. Probability: Low. Only development environment was observed. Production environment may already have two virtual CPUs defined. Impact: High. WebSphere has a significant benefit from multiple CPUs in Linux. b) SWAPGEN Script Details: This script, developed by Sine Nomine Associates, is used to prepare a VDISK for use as a swap device in Linux ( It is called from the virtual machine's PROFILE EXEC so the VDISK is created before the system boots. Red Hat's Recommendation: Download the SWAPGEN script, then make it available on the user LINUXADM's 191/a disk. Use SWAPGEN to create two VDISK swap spaces, at addresses 300 and 301. The first VDISK is 256MB, and the second is 512MB. Add the following lines to the user LINUXADM's PROFILE EXEC: 'SWAPGEN ' 'SWAPGEN ' Include in the DASD list (in the CMS CONF FILE before installation, or /etc/modprobe.conf afterwards). In Linux, use pri= in the /etc/fstab options to give the smallest VDISK swap the highest priority, followed by the larger VDISK, then swap space on DASD with the lowest priority. Probability: High. Initial audit showed only DASD swap was being used. Impact: High. Using VDISK swap can significantly improve Linux swap performance since VDISK is implemented in real memory. c) Disable Minidisk Cache for Swap Device Details: Minidisk swap is enabled for all disks unless explicitly disabled. Since swap devices are designed for many writes and few reads, minidisk cache should not be used. Red Hat's Recommendation: Instead of using an LVM partition for swap, split the existing minidisk into two disks, with one dedicated as a swap device. In the user directory, add the following line after the swap minidisk: MINIOPT NOMDC Probability: Low. Swap should happen on VDISK first, then DASD based on priority. This is only for very high memory pressure situations. Impact: Medium. Depending on swap usage, this could have a positive impact on Linux memory subsystem performance.

11 3.3.Red Hat Enterprise Linux Configuration a) Pre-emptive Support and Troubleshooting 1. DASD dump Details: In cases where Red Hat/IBM support requires a kernel core image for diagnostic troubleshooting, for example after a system crash or performance-related problem, DASD can be used to obtain a vmcore dump of the virtual machine memory. This requires a minidisk at least as large as the virtual machine memory size. In cases where disk space is a shortage, if every virtual machine cannot have a dedicated minidisk for DASD dump, a shared minidisk can be used for multiple guests. However, if any two guests experience a system crash at the same time, both vmcore images will be unusable. This should only be used when a single vmcore image is captured at a time. Red Hat's Recommendation: Configure DASD dump as outlined in the IBM documentation (see Using the Dump Tools Probability: Low. System crash and kernel vmcore capture is a rare occurrence. Impact: High. resolution. Providing vmcore data to Red Hat/IBM support greatly expedites issue 2. IUCV terminal Details: System z uses an internal network called IUCV to implement a TTY terminal client and server. This terminal can replace the 3270 console for troubleshooting a virtual machine when TCP/IP and SSH are not available, for example during system startup. This terminal also allows traditional Linux text editors to run, such as vi and emacs, instead of relying on line-mode editors in the 3270 console. See Appendix 2 for graphical depiction. Red Hat's Recommendation: Configure the IUCV terminal as outlined in the IBM documentation (See How to Set up a Terminal Server Environment Probability: Low. This is only used when troubleshooting a problem. Impact: Medium. Replaces the need to train system administrators on 3270 console usage. 3. Rescue mode Details: In the event the virtual machine cannot startup normally, Red Hat Enterprise Linux can be configured to start in rescue mode, which is a failsafe mode used for system recovery. Red Hat's Recommendation: Configure system startup with the option to load rescue mode, to be used if the system cannot boot normally. This procedure is described in the following document: (see section 13.5 Rescuing a Linux system, page 219, PDF page 239). In addition, this can be added to a common startup menu as an additional boot option. See section Virtual machine startup menu under z/vm Configuration, Startup and shutdown earlier in this document. Probability: Low. This is only used when the system does not startup properly. Impact: Medium. In the event the system does not start, there are other options to access the

12 system, including the IUCV terminal (discussed earlier in this section) and a maintenance virtual machine (discussed next). At least one of these methods should be implemented. 4. Maintenance virtual machine Details: z/vm provides the ability to access and locally mount the root file system of one virtual machine within another. This enables one virtual machine to be used to repair another, in the event that files become corrupted or misconfigured which prevent normal startup. Red Hat's Recommendation: Designate one guest as a maintenance virtual machine. This should be a relatively small guest that is powered off most of the time, but can be booted and used to fix problems in another. The maintenance virtual machine will primarily use the vmcp tool provided in Red Hat Enterprise Linux to link and attach one or more virtual DASD from one virtual machine to itself. This guest should contain basic tools to troubleshoot a system, such as LVM tools, a file system checker, and text editor. Probability: Low. This is only required when a virtual machine does not startup normally. Impact: Medium. Other options exist to access a non-booting system. b) CPU and Memory 1. cpuplugd service Details: The cpuplugd service is a daemon which continually monitors system load, then enables or disables virtual CPUs based on that load. When the system load drops below a threshold, additional virtual CPUs are disabled, thus improving z/vm application scheduling. When system load increases, virtual CPUs are enabled to handle the new workload. Red Hat's Recommendation: Enable the cpuplugd service. This ensures that idle systems use less CPU resources, and busier systems get scheduled more often. Probability: Medium. Depends on system load. Impact: Medium. Recommended for workloads with peak utilizations throughout the day that are otherwise closer to idle. 2. Dynamic CPU add/remove Details: Linux can enable and disable CPUs dynamically, also referred to as CPU hotplug. Using this, additional CPUs can be added to a virtual machine during high utilization, for example to complete workloads faster. They can then be disabled dynamically. Red Hat's Recommendation: Configure virtual machines with the ability to perform CPU hotplug. See Appendix 3 for more information. Probability: Low. Depends on workload. This is useful to manually manage CPU resources; however, z/vm may already do an adequate job of dynamically assigning and scheduling these resources. Impact: Medium. Adding CPU resources can have a positive impact on virtual machine performance. Note, however, that this should not be used in conjunction with the cpuplugd service discussed above, as the effect is cancelled out. 3. /tmp file system Details: The current SOE specifies a tmpfs file system for storing temporary files in /tmp, which

13 is a RAMdisk allocated out of real memory. Given the amount of files currently observed in /tmp, this can have a negative impact on system performance for Linux on System z, especially if VDISK is implemented. Red Hat's Recommendation: Include /tmp in the existing LVM file system structure instead of using the tmpfs RAMdisk. Probability: High. The current SOE for x86 specifies that /tmp use tmpfs. Impact: High. Temporary files kept in real memory will waste shared resources in this virtual environment. c) Networking 1. Increase MTU size Details: Current MTU size is 1500 bytes. The z/vm VSWITCH can handle larger MTU sizes, which increase throughput and decrease CPU utilisation for applications that send packets larger than 1500 bytes. Red Hat's Recommendation: Use MTU of 8992 bytes, which is the recommended size for z/vm VSWITCH. Probability: Medium. Depends on application workload, and whether it benefits from sending large packets. Impact: Medium. Can drastically increase throughput under certain network configurations. 2. Increase buffer count Details: The qeth network driver supports larger internal buffers for virtual machines with heavy network load. One buffer consists of 16x4KB pages. The default value is 16 buffers, which occupies 1 MB of memory. The maximum value is 128, which occupies 8 MB of memory. Red Hat's Recommendation: For virtual machines that are not memory constrained, and are expected to have heavy network throughput, increase buffers to 128. This is done by adding the following line to /etc/sysconfig/network-scripts/ifcfg-eth0: OPTIONS= buffer_count=128 Probability: Low. Depends on workload, only designed for heavy network traffic. Impact: High. Can significantly improve network bandwidth for a single virtual machine.

14 d) Shutdown 1. Change /etc/inittab behaviour Details: z/vm provides the ability to trigger a Ctrl+Alt+Del with the SIGNAL SHUTDOWN command. By default, Linux handles Ctrl+Alt+Del with a reboot. However, z/vm assumes the signal should cause the guest to halt. Red Hat's Recommendation: Change the behaviour of Ctrl+Alt+Del to shutdown instead of reboot. In /etc/inittab, make the following change: ca::ctrlaltdel:/sbin/shutdown -t3 -h now Probability: Low. Only triggered during SIGNAL SHUTDOWN, which occurs manually or during z/vm shutdown. Impact: Low. z/vm could inadvertently reboot a system when the intent was to shutdown. 2. Configure shutdown actions Details: By default when Linux is halted, the virtual machine remains logged on. This consumes unnecessary resources as z/vm must maintain the guest's memory allocation, along with any other resources in use. Red Hat's Recommendation: Use the shutdown actions interface to set each virtual machine to logoff when powered off or halted. In /etc/rc.local, add the following lines: /usr/sbin/chshut halt vmcmd logoff /usr/sbin/chshut poff vmcmd logoff Probability: High. The default action is to remain logged in after halt or power off. Impact: Medium. Protects against a virtual machine remaining inadvertently logged on and consuming unused resources.

15 3.4. Standard Operating Environment a) Installed Packages Detail: There are a number of packages installed as part of the SOE that are either no longer needed due to the move to a virtualized System Z environment or no longer used. Red Hat's Recommendation: Remove unnecessary packages and turn off unnecessary services, such as: Packages to be removed - OpenIPMI*, aspell, busybox, cyrus-sasl*, dmraid, ipsec-tools, iptables-ipv6, kudzu, nmap, system-config-network-tui, system-config-securitylevel-tui, kexec-tools, mdadm, dhcpv6-client, samba-common, subversion. Services to be turned off netfs, rawdevices, xinetd (possibly required for Netbackup). Probability: Low. Ensure the servers are kept up-to-date with relevant security patches. Impact: Medium. By having unnecessary packages as well as services turned on, this could pose a security risk as well as an extra maintenance overhead. Affected Environment: ALL b) SELinux Details: SELinux has been set to "permissive" on all of the servers. SELinux is the cornerstone of the Red Hat security model, and it should be enabled and enforcing at all times. Some organisations will not use SELinux for internal servers because it is believed that there is a minimal chance of compromise on those servers. Red Hat strongly recommends the use of SELinux for any Internet or customer facing servers. Red Hat's Recommendation: Create appropriate SELinux profiles for any third party applications required on all servers and set SELinux to enforcing mode. Probability: Medium. SELinux is part of Red Hat Enterprise Linux's security and we suggest it not be disabled. Impact: Medium. SELinux enforces services security for Red Hat systems and services. Affected Environment: ALL c) iptables Details: iptables are currently installed, but not configured on every server. Iptables provides an additional layer of security on a per system level, while still being able to be centrally managed by puppet. Red Hat's Recommendation: Create appropriate iptables rules for any third party applications required on all servers and use puppet to centrally manage the rules on a per project or system purpose basis. Probability: Medium. Iptables provides a host based firewall increasing each servers security. Impact: Medium. With iptables on all Red Hat systems and services have an additional layer of security in front of them. Affected Environment: ALL

16 d) SSH Configuration Details: root logins via SSH are enabled in both the development and staging environments and X11 Forwarding is enabled in all environments. Disabling root logins in the other two environments ensures that login procedures and security are the same across all environments. Whilst allowing X11 Forwarding is a potential weakness in security and should not be enabled in a blanket configuration for all systems in all environments and only be enabled where necessary [this sentence needs rewording] Red Hat's Recommendation: root logins via ssh be disabled for all environments, not just production. X11 forwarding should be disabled by default and only enabled on systems where needed. X11Forwarding no PermitRootLogin no Probability: Medium. This will not cause any issues, but will provide consistency and increase security across all environments. Impact: Medium. Different procedures for the different environments can lead to mistakes and overall lowering in security. Affected Environment: ALL e) Centralised Logging Details: For security reasons and administrative reasons, centralised logging should be considered. This will ensure logs to be available at a central location for debugging and security audit. Red Hat's Recommendation: Using rsyslog instead of syslog remote logging feature should be enabled. Also, a centralised log server should be configured so all the server logs can be stored. Probability: Low. This will not cause any issues, but this will help in reducing administrative overhead and increasing security. Impact: Low. There will not be an immediate issue related to this. However, the centralised logging is a feature that should be considered. Affected Environments: ALL f) sysctl.conf / limits.conf Details: Very limited optimisation and hardening has been done for both /etc/security/limits.conf and /etc/sysctl.conf. Doing further work in this area could prevent future resource problems, improve performance and increase security. Red Hat's Recommendation: Further tuning and hardening of the limits.conf and sysctl.conf files on a per server purpose in sysctl.conf's case and per application in limits.conf's case should be performed. Probability: Medium. This will not cause any issues, but could provide both performance and security improvements. Impact: Low. There will not be an immediate issue related to this. However, tuning of these files is recommended for all systems. Affected Environment: ALL

17 g) tmpfs Usage on /tmp and /var/tmp Details: tmpfs is being used for both /tmp and /var/tmp which on virtual systems with tightly controlled and limited memory could potentially see RAM being used by files being stored in these directories. Red Hat's Recommendation: /tmp and /var/tmp should not be mounted as tmpfs and instead be moved to use normal disk. Probability: Medium. This will not cause any immediate issues, but a system could run out of memory if files are stored in these directories. Impact: Medium. There will not be an immediate issue related to this. However, on limited memory virtual systems it's recommended this be done before problems occur in the future. Affected Environment: ALL h) auditd Details: auditd is part of the Linux Auditing System and is configured with only the default configuration. A more comprehensive configuration would provide auditing capabilities such as who accessed or changed certain files on a system. Red Hat's Recommendation: Further configuration of auditd can provide proper audit trail information for important system configuration files and/or application files, allowing the tracking and logging of who accessed or changed them. Probability: Low. This will not cause any immediate issues, but this will help system auditing. Impact: Low. There will not be an immediate issue related to this. However, further auditing will provide a way to find out who or what made changes to important files on a system. Affected Environment: ALL i) Kickstart Details: The SOE kickstart file was created for x86 systems and contains certain packages that are no longer appropriate for a virtual system running on System Z or would be better moved to be controlled by puppet. Red Hat's Recommendation: Many of the required packages should be moved out of the kickstart file and into puppet, with general system or multi-dependent packages being configured in packages-*.pp files and packages that are dependencies for certain applications being configured in that applications pp file as is currently being done, this will insure that puppet knows about all required packages, can restore them if necessary and that only required packages for a for the applications running on the system are installed. In addition group is relatively large, only installing required packges is recommended. Probability: Low. This will not cause any immediate issues, but will centralise configuration control further into puppet and lower the number of unnecessary packages on certain systems. Impact: Low. There will not be an immediate issue related to this. However, what packages are installed and on which system is controlled from one place and with greater ease. Affected Environment: ALL

18 j) Netbackup Details: Symantec Netbackup is currently configured to be installed on all systems. Netbackup is not the best backup solution for Red Hat Enterprise Linux on System z based systems. It has a history of causing performance issues that may result in problems with backups. Red Hat's Recommendation: On System z Red Hat suggests to choose a backup solution that has a good track record and no known issues, e.g. IBM Tivoli Storage Manager (TSM). Probability: Medium. Backups may not work properly and backups should be tested regularly for restore capability. Impact: High. Missing or incomplete backups can result in the loss of data. Affected Environment: ALL

19 3.5. Puppet Configuration a) System arch based modules Details: The move to using System Z has introduced an additional architecture that needs to be controlled and configured by puppet. Considerable work has been done in this area already, however further work needs to be done. Red Hat's Recommendation: The creation of modules for all system architectures to allow for the splitting out of x86 specific software and configurations from the base-1_3 puppet module. For example the Netbackup puppet configuration, which is not the ideal backup solution on System Z based systems, but is currently located in base-1_3. Probability: Medium. Inappropriate packages and configuration for System Z based virtual machines will be installed because they are located in base and not a x86 based arch module. Impact: Medium. If inappropriate packages are installed, such as Netbackup, expected results and functions might not happen. Affected Environments: ALL b) Project specific configuration in base module Details: There is still project specific configuration located in the base-1_3 puppet module. Red Hat's Recommendation: The removal of any project specific configuration still left in base- 1_3, such as the configuration in the network-common.pp. Moving this to the Acme module would consolidate all the project configuration into one place as well as simplify the puppet configuration in base-1_3. Probability: Low. This will not cause any immediate issues, but having standardised locations for all project configuration makes management easier. Impact: Low. There will not be an immediate issue related to this. But will provide a simplified puppet configuration. Affected Environments: ALL c) General puppet configuration Details: Large and complicated puppet configurations can place considerable system load on the puppet master server. If puppets configuration is broken down into as many small and simple modules as possible and then configured only on the systems that require them, the puppet master has a lot less work to do and a higher performance can be extracted from the system before load becomes an issue. Red Hat's Recommendation: The base module should be kept as small and as simple as possible, to keep system load on the puppet master within manageable levels as the puppet configurations and use grow over time. Probability: Low. This will not cause any immediate issues, but something to plan for in the future. Impact: Low. There will not be an immediate issue related to this. The puppet master can place considerable load on a system in large and complicated environments. Affected Environments: ALL

20 d) Minor issues Details: The additional templates and configuration files for limits.conf and stsctl.conf appear to be missing. Postfix and puppet pp files are included twice in the base-1_3 init.pp file. Red Hat's Recommendation: Create the required template and configuration files for the management of limits and sysctl so they will work as expected. Remove the duplicate entries from the init.pp in base-1_3 puppet module. Probability: Medium. This will not cause any immediate issues, but the expected configurations for sysctl and limits will not be in place and unexpected results at both the OS and application level might occur. Impact: Medium. There will not be an immediate issue related to this. However once load testing is performed, applications might reach the defaults system limits and behave in an unexpected manner. Affected Environments: ALL

21 3.6. Appendix a) Starting up scripts The following example shows REXX scripting to present a menu at each virtual machine login. This should be added to the user linuxadm's PROFILE EXEC. This menu is only shown during an interactive login on the 3270 console. If the user is started automatically via the XAUTOLOG command, the menu is bypassed and the guest is booted with IPL. Note that after adding these lines, it is recommended to start the virtual machine automatically when z/vm starts by adding XAUTOLOG statements in the user autolog1's PROFILE EXEC 'PIPE CP QUERY' userid() ' var user' parse value user with id. dsc ipldisk = if (userid() <> 'LINUXADM') then do vmfclear say ' ' say ' ' say 'Press <Enter> to boot normally' say ' ' say ' ' say 'MENU' say '----' say '1. Boot Linux (Default)' say '2. Start interactive session with CMS' say '3. Logout' say ' ' say ' ' say 'Enter Choice' 'CP TERM MORE 0 0' if (dsc = 'DSC') then /* user is disconnected */ 'CP IPL' ipldisk else /* user is interactive -> prompt */ do parse upper pull answer if (answer = '1') then 'CP IPL' ipldisk else if (answer = '2') then say ' ' else if (answer = '3') then 'CP LOG HOLD' else 'CP IPL' ipldisk end /* else */ end

22 b) TTY Terminal over IUCV Network Terminal Session z/vm Linux Terminal Server ts-shell iucvconn Linu xz/vm IUCV HVC Device Driver IUCV Linux z/vm IUCV HVC Device Driver z/vm IUCV HVC Device Driver Linu x z/vm IUCV HVC Device Driver Linux

23 c) Dynamic CPU Dynamic CPU configuration (from CPU resources are controlled in two places. First in the profile of the guest, and second in the zipl bootloader. Follow these steps to add CPU resources: 1. Using a 3270 emulator, connect to z/vm using the MAINT user-id 2. Using xedit, edit the user-id DIRECT as follows: xedit USER DIRECT 3. Find the stanza which describes the default user profile for the Red Hat Enterprise Linux guest 4. Edit the line MACHINE ESA X to reflect the correct number of CPUs 5. Add lines as necessary below to reflect the CPUs. For example: PROFILE RHDFLT MACHINE ESA 4 CPU 00 BASE CPU 01 CPU 02 CPU Save by issuing the FILE command, then logoff 7. Log onto the Red Hat Enterprise Linux guest as root and edit /etc/zipl.conf 8. Change the entry for the kernel, specifically, the line which reads parameters. It should read parameters="root=/dev/volgroup00/logvol00". Change the line to read parameters="root=/dev/volgroup00/logvol00 maxcpus=4". Note: setting maxcpus to a value LESS than the value of maxcpus still adds the CPUs to the system, but leaves them unused by the Red Hat Enterprise Linux guest. 9. Run the command zipl to apply the changes and reboot. The CPU resources will now be available to the Red Hat Enterprise Linux guest. Dynamic CPU Enablement (from Enabling CPU resources is straightforward. Simply follow these steps: 1. Run the command cd /sys/devices/system/cpu 2. This directory lists the CPUs available to the running guest. 3. To query the status of the CPUs, issue the command cat cpux/online where X refers to the cpu-id. If the value returned is 1, then that CPU is online and in use. If the value returned is 0 then that CPU is unused and available. 4. Unused CPUs can be brought online by issuing the command echo "1" > cpux/online 5. Conversely, CPUs can be taken offline by issuing the command echo "0" > cpux/online

GSE z/os Systems Working Group s390-tools

GSE z/os Systems Working Group s390-tools Bertrand Jouniaux 2011/06/15 GSE z/os Systems Working Group s390-tools Based on s390-tools: The Swiss Army Knife for Linux on System z System Administration Hans-Joachim Picht Running Linux on System z

More information

IBM Infrastructure Suite for z/vm and Linux

IBM Infrastructure Suite for z/vm and Linux IBM Infrastructure Suite for z/vm and Linux Tracy Dean, IBM [email protected] October 2015 Agenda Solution introduction Solution details Summary, contacts, and more information 2 IBM Infrastructure Suite

More information

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course ID RHL200 Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course Description Students will experience added understanding of configuration issues of disks,

More information

Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment

Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Network (RHN) Satellite server is an easy-to-use, advanced systems management platform

More information

Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment

Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Satellite server is an easy-to-use, advanced systems management platform for your Linux infrastructure.

More information

Customer Experiences:

Customer Experiences: Customer Experiences: Managing the z/vm and Linux on z Systems Infrastructure Tracy Dean IBM [email protected] June 2015 Agenda What does managing include? What tools or products can you use? Customer scenarios

More information

RedHat (RHEL) System Administration Course Summary

RedHat (RHEL) System Administration Course Summary Contact Us: (616) 875-4060 RedHat (RHEL) System Administration Course Summary Length: 5 Days Prerequisite: RedHat fundamentals course Recommendation Statement: Students should have some experience with

More information

Parallels Cloud Server 6.0 Readme

Parallels Cloud Server 6.0 Readme Parallels Cloud Server 6.0 Readme Copyright 1999-2012 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Contents About This Document... 3 About Parallels Cloud Server 6.0... 3 What's

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...

More information

ENTERPRISE LINUX SYSTEM ADMINISTRATION

ENTERPRISE LINUX SYSTEM ADMINISTRATION ENTERPRISE LINUX SYSTEM ADMINISTRATION The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course focuses on issues universal to every workstation

More information

SUSE Manager. A Comprehensive Linux Server Management the Linux Way. Name. Title Email

SUSE Manager. A Comprehensive Linux Server Management the Linux Way. Name. Title Email SUSE Manager A Comprehensive Linux Server Management the Linux Way Name Title Email Agenda 2 Product Overview Features and Functionality Management Module Provisioning Module Monitoring Roadmap Pricing

More information

Parallels Cloud Server 6.0

Parallels Cloud Server 6.0 Parallels Cloud Server 6.0 Readme September 25, 2013 Copyright 1999-2013 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Contents About This Document... 3 About Parallels Cloud Server

More information

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux.. RH131 Red Hat Linux System Administration Course Summary For users of Linux (or UNIX) who want to start building skills in systems administration on Red Hat Linux, to a level where they can attach and

More information

Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.

Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux. Red Hat Enterprise Linux 7- RH124 Red Hat System Administration I Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux. This course will actively engage students

More information

How To Install A Virtual Image Facility On Linux (Amd64) On A 3390 Dasd 3390 (Amd32) Dasda (Amd86) (Amd66) (Dasd) (Virtual Image Facility) (For

How To Install A Virtual Image Facility On Linux (Amd64) On A 3390 Dasd 3390 (Amd32) Dasda (Amd86) (Amd66) (Dasd) (Virtual Image Facility) (For S/390 Virtual Image Facility for Linux (VIF) WAVV 2000 Colorado Springs October, 2000 Agenda Introduction Product Overview Planning Installation Positioning Availability Introduction S/390 Virtual Image

More information

Performance and scalability of a large OLTP workload

Performance and scalability of a large OLTP workload Performance and scalability of a large OLTP workload ii Performance and scalability of a large OLTP workload Contents Performance and scalability of a large OLTP workload with DB2 9 for System z on Linux..............

More information

Managing your Red Hat Enterprise Linux guests with RHN Satellite

Managing your Red Hat Enterprise Linux guests with RHN Satellite Managing your Red Hat Enterprise Linux guests with RHN Satellite Matthew Davis, Level 1 Production Support Manager, Red Hat Brad Hinson, Sr. Support Engineer Lead System z, Red Hat Mark Spencer, Sr. Solutions

More information

PARALLELS SERVER 4 BARE METAL README

PARALLELS SERVER 4 BARE METAL README PARALLELS SERVER 4 BARE METAL README This document provides the first-priority information on Parallels Server 4 Bare Metal and supplements the included documentation. TABLE OF CONTENTS 1 About Parallels

More information

Agenda. Enterprise Application Performance Factors. Current form of Enterprise Applications. Factors to Application Performance.

Agenda. Enterprise Application Performance Factors. Current form of Enterprise Applications. Factors to Application Performance. Agenda Enterprise Performance Factors Overall Enterprise Performance Factors Best Practice for generic Enterprise Best Practice for 3-tiers Enterprise Hardware Load Balancer Basic Unix Tuning Performance

More information

Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308

Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308 Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308 Laura Knapp WW Business Consultant [email protected] Applied Expert Systems, Inc. 2011 1 Background

More information

z/vm and Linux on zseries Performance Monitoring An Update on How and With What Products

z/vm and Linux on zseries Performance Monitoring An Update on How and With What Products Tivoli Software z/vm and Linux on zseries Performance Monitoring An Update on How and With What Products Laura Knapp [email protected] August 2006 2006 IBM Corporation Agenda Opportunity New work loads

More information

Directions for VMware Ready Testing for Application Software

Directions for VMware Ready Testing for Application Software Directions for VMware Ready Testing for Application Software Introduction To be awarded the VMware ready logo for your product requires a modest amount of engineering work, assuming that the pre-requisites

More information

Running Linux on System z as a z/vm Guest: Useful Things to Know

Running Linux on System z as a z/vm Guest: Useful Things to Know Hans-Joachim Picht, Linux on System z Initiatives & Linux Champion EMEA Running Linux on System z as a z/vm Guest: Useful Things to Know Session 8649 Friday, March 4, 2011: 9:30 AM-10:30

More information

User Experience Implementing SSL and Terminal Servers in z/vm 6.1

User Experience Implementing SSL and Terminal Servers in z/vm 6.1 User Experience Implementing SSL and Terminal Servers in z/vm 6.1 Jim Moling US Treasury, Financial Management Service Friday, August 12, 2011 Session Number 10047 Disclaimers The opinions & ideas expressed

More information

PARALLELS SERVER BARE METAL 5.0 README

PARALLELS SERVER BARE METAL 5.0 README PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal

More information

Virtualizare sub Linux: avantaje si pericole. Dragos Manac

Virtualizare sub Linux: avantaje si pericole. Dragos Manac Virtualizare sub Linux: avantaje si pericole Dragos Manac 1 Red Hat Enterprise Linux 5 Virtualization Major Hypervisors Xen: University of Cambridge Computer Laboratory Fully open sourced Set of patches

More information

Audit & Tune Deliverables

Audit & Tune Deliverables Audit & Tune Deliverables The Initial Audit is a way for CMD to become familiar with a Client's environment. It provides a thorough overview of the environment and documents best practices for the PostgreSQL

More information

Using Symantec NetBackup with Symantec Security Information Manager 4.5

Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights

More information

Disaster Recovery Cookbook for Linux Part 1: Before the Storm

Disaster Recovery Cookbook for Linux Part 1: Before the Storm Disaster Recovery Cookbook for Linux Part 1: Before the Storm David Boyes 2007 Where to Get This Presentation The presentation and sample execs can be downloaded from: http://www.sinenomine.net/publications/presentations

More information

HP-UX System and Network Administration for Experienced UNIX System Administrators Course Summary

HP-UX System and Network Administration for Experienced UNIX System Administrators Course Summary Contact Us: (616) 875-4060 HP-UX System and Network Administration for Experienced UNIX System Administrators Course Summary Length: Classroom: 5 days Virtual: 6 hrs/day - 5 days Prerequisite: System Administration

More information

Cloud Server. Parallels. An Introduction to Operating System Virtualization and Parallels Cloud Server. White Paper. www.parallels.

Cloud Server. Parallels. An Introduction to Operating System Virtualization and Parallels Cloud Server. White Paper. www.parallels. Parallels Cloud Server White Paper An Introduction to Operating System Virtualization and Parallels Cloud Server www.parallels.com Table of Contents Introduction... 3 Hardware Virtualization... 3 Operating

More information

System i and System p. Customer service, support, and troubleshooting

System i and System p. Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,

More information

White paper: Unlocking the potential of load testing to maximise ROI and reduce risk.

White paper: Unlocking the potential of load testing to maximise ROI and reduce risk. White paper: Unlocking the potential of load testing to maximise ROI and reduce risk. Executive Summary Load testing can be used in a range of business scenarios to deliver numerous benefits. At its core,

More information

Virtual Linux Server Disaster Recovery Planning

Virtual Linux Server Disaster Recovery Planning Virtual Linux Server Disaster Recovery Planning Rick Barlow Nationwide Insurance August 2013 Session 13726 Agenda Definitions Our Environment Business Recovery Philosophy at Nationwide Planning Execution

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described

More information

BridgeWays Management Pack for VMware ESX

BridgeWays Management Pack for VMware ESX Bridgeways White Paper: Management Pack for VMware ESX BridgeWays Management Pack for VMware ESX Ensuring smooth virtual operations while maximizing your ROI. Published: July 2009 For the latest information,

More information

RELEASE NOTES. StoneGate Firewall/VPN v2.2.11 for IBM zseries

RELEASE NOTES. StoneGate Firewall/VPN v2.2.11 for IBM zseries RELEASE NOTES StoneGate Firewall/VPN v2.2.11 for IBM zseries Copyright 2006 Stonesoft Corp. All rights reserved. All trademarks or registered trademarks are property of their respective owners. Disclaimer:

More information

Server Virtualization with VMWare

Server Virtualization with VMWare Server Virtualization with VMware Information Technology Server Virtualization with VMWare A look at server virtualization, what it is and why it should be considered. By Alex Dewar, Head of IT & IM Solutions,

More information

An Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database

An Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database An Oracle White Paper November 2010 Oracle Real Application Clusters One Node: The Always On Single-Instance Database Executive Summary... 1 Oracle Real Application Clusters One Node Overview... 1 Always

More information

PARALLELS CLOUD SERVER

PARALLELS CLOUD SERVER PARALLELS CLOUD SERVER An Introduction to Operating System Virtualization and Parallels Cloud Server 1 Table of Contents Introduction... 3 Hardware Virtualization... 3 Operating System Virtualization...

More information

VIRTUOZZO TM FOR LINUX 2.6.1

VIRTUOZZO TM FOR LINUX 2.6.1 . VIRTUOZZO TM FOR LINUX 2.6.1 WHAT S NEW DOCUMENT Copyright 2005 SWsoft TABLE OF CONTENTS TABLE OF CONTENTS... 2 INTRODUCTION: KEY THEMES... 3 Ease of Use and Manageablity... 3 Security... 3 Powerful...

More information

Making z/vm and Linux Guests Production Ready Best Practices

Making z/vm and Linux Guests Production Ready Best Practices Making z/vm and Linux Guests Production Ready Best Practices IBM Washington Systems Center Advanced Technical Support Jon von Wolfersdorf [email protected] Trademarks The following are trademarks of the

More information

Extreme Networks Security Upgrade Guide

Extreme Networks Security Upgrade Guide Extreme Networks Security Upgrade Guide 9034868 Published July 2015 Copyright 2012 2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make changes in specifications and

More information

Virtual Networking with z/vm 5.1.0 Guest LAN and Virtual Switch

Virtual Networking with z/vm 5.1.0 Guest LAN and Virtual Switch Virtual Networking with z/vm 5.1.0 Guest LAN and Virtual Switch HILLGANG March 2005 Dennis Musselwhite, IBM z/vm Development, Endicott, NY Note References to IBM products, programs, or services do not

More information

Cisco Nexus 1000V Virtual Ethernet Module Software Installation Guide, Release 4.0(4)SV1(1)

Cisco Nexus 1000V Virtual Ethernet Module Software Installation Guide, Release 4.0(4)SV1(1) Cisco Nexus 1000V Virtual Ethernet Module Software Installation Guide, Release 4.0(4)SV1(1) September 17, 2010 Part Number: This document describes how to install software for the Cisco Nexus 1000V Virtual

More information

HP Insight Diagnostics Online Edition. Featuring Survey Utility and IML Viewer

HP Insight Diagnostics Online Edition. Featuring Survey Utility and IML Viewer Survey Utility HP Industry Standard Servers June 2004 HP Insight Diagnostics Online Edition Technical White Paper Featuring Survey Utility and IML Viewer Table of Contents Abstract Executive Summary 3

More information

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0 ReadyNAS Replicate Software Reference Manual 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10727-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced,

More information

Solution Guide Parallels Virtualization for Linux

Solution Guide Parallels Virtualization for Linux Solution Guide Parallels Virtualization for Linux Overview Created in 1991, Linux was designed to be UNIX-compatible software that was composed entirely of open source or free software components. Linux

More information

GL-250: Red Hat Linux Systems Administration. Course Outline. Course Length: 5 days

GL-250: Red Hat Linux Systems Administration. Course Outline. Course Length: 5 days GL-250: Red Hat Linux Systems Administration Course Length: 5 days Course Description: The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course

More information

Cloud Server. Parallels. Key Features and Benefits. White Paper. www.parallels.com

Cloud Server. Parallels. Key Features and Benefits. White Paper. www.parallels.com Parallels Cloud Server White Paper Key Features and Benefits www.parallels.com Table of Contents Introduction... 3 Key Features... 3 Distributed Cloud Storage (Containers and Hypervisors)... 3 Rebootless

More information

Proposal for Virtual Private Server Provisioning

Proposal for Virtual Private Server Provisioning Interpole Solutions 1050, Sadguru Darshan, New Prabhadevi Road, Mumbai - 400 025 Tel: 91-22-24364111, 24364112 Email : [email protected] Website: www.interpole.net Proposal for Virtual Private Server

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Migrating to ESXi: How To

Migrating to ESXi: How To ILTA Webinar Session Migrating to ESXi: How To Strategies, Procedures & Precautions Server Operations and Security Technology Speaker: Christopher Janoch December 29, 2010 Migrating to ESXi: How To Strategies,

More information

VMware ESX Server 3 Configuration Guide

VMware ESX Server 3 Configuration Guide Date: 03/03/08 VMware ESX Server 3 Configuration Guide Enterprise Applications Division of the Systems and Network Analysis Center (SNAC) Information Assurance Directorate National Security Agency 9800

More information

NATIONAL POPULATION REGISTER (NPR)

NATIONAL POPULATION REGISTER (NPR) NATIONAL POPULATION REGISTER (NPR) Project Name: NPR Version No: 1.0.0 Release Date: Group Name: NPR-ECIL Version Date: LINUX SERVER INSTALLATION AND CONFIGURATION FOR JAVA BASED NPR DATAENTRY SOFTWARE

More information

AirWave 7.7. Server Sizing Guide

AirWave 7.7. Server Sizing Guide AirWave 7.7 Server Sizing Guide Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the Mobile Edge Company logo, Aruba

More information

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added

More information

LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013

LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013 LOCKSS on LINUX CentOS6 Installation Manual 08/22/2013 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 6 BIOS Settings... 9 Installation... 10 Firewall Configuration...

More information

A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM

A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM 1 V.A.Injamuri Govt. College of Engineering,Aurangabad, India 1 [email protected] Abstract This paper is focused on practical securing Linux

More information

Veritas Cluster Server from Symantec

Veritas Cluster Server from Symantec Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

Deploying IBM Lotus Domino on Red Hat Enterprise Linux 5. Version 1.0

Deploying IBM Lotus Domino on Red Hat Enterprise Linux 5. Version 1.0 Deploying IBM Lotus Domino on Red Hat Enterprise Linux 5 Version 1.0 November 2008 Deploying IBM Lotus Domino on Red Hat Enterprise Linux 5 1801 Varsity Drive Raleigh NC 27606-2072 USA Phone: +1 919 754

More information

VMware vsphere 5 Quick Start Guide

VMware vsphere 5 Quick Start Guide VMware vsphere 5 Quick Start Guide This document is created to provide some basic information about VMware, and allow you, the customer, to determine when and how to engage us for support or other needs

More information

Deploying Ubuntu Server Edition. Training Course Overview. (Ubuntu 10.04 LTS)

Deploying Ubuntu Server Edition. Training Course Overview. (Ubuntu 10.04 LTS) Deploying Ubuntu Server Edition Training Course Overview (Ubuntu 10.04 LTS) 1. Deploying Ubuntu Server Edition Course Overview About the Course and Objectives This advanced 40-hour course will provide

More information

Best Practices for VMware ESX Server 2

Best Practices for VMware ESX Server 2 Best Practices for VMware ESX Server 2 2 Summary VMware ESX Server can be deployed in many ways. In this document, we recommend specific deployment guidelines. Following these guidelines will maximize

More information

Chapter 2 Array Configuration [SATA Setup Utility] This chapter explains array configurations using this array controller.

Chapter 2 Array Configuration [SATA Setup Utility] This chapter explains array configurations using this array controller. Embedded MegaRAID SATA User's Guide Areas Covered Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview This chapter introduces

More information

Backing Up and Restoring a z/vm Cluster and Linux on System z Guests

Backing Up and Restoring a z/vm Cluster and Linux on System z Guests SHARE Session 10246 Backing Up and Restoring a z/vm Cluster and Linux on System z Guests Tracy Dean, IBM [email protected] March 2012 Agenda Recommended practices Requirements for these scenarios Overview

More information

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main

More information

CXS-203-1 Citrix XenServer 6.0 Administration

CXS-203-1 Citrix XenServer 6.0 Administration Page1 CXS-203-1 Citrix XenServer 6.0 Administration In the Citrix XenServer 6.0 classroom training course, students are provided with the foundation necessary to effectively install, configure, administer,

More information

Distribution One Server Requirements

Distribution One Server Requirements Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and

More information

Virtual Networking with z/vm Guest LANs and the z/vm Virtual Switch

Virtual Networking with z/vm Guest LANs and the z/vm Virtual Switch Virtual Networking with z/vm Guest LANs and the z/vm Virtual Switch Alan Altmark, IBM z/vm Development, Endicott, NY Note References to IBM products, programs, or services do not imply that IBM intends

More information

Also on the Performance tab, you will find a button labeled Resource Monitor. You can invoke Resource Monitor for additional analysis of the system.

Also on the Performance tab, you will find a button labeled Resource Monitor. You can invoke Resource Monitor for additional analysis of the system. 1348 CHAPTER 33 Logging and Debugging Monitoring Performance The Performance tab enables you to view the CPU and physical memory usage in graphical form. This information is especially useful when you

More information

CHAPTER 15: Operating Systems: An Overview

CHAPTER 15: Operating Systems: An Overview CHAPTER 15: Operating Systems: An Overview The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint

More information

Migrating LAMP stack from x86 to Power using the Server Consolidation Tool

Migrating LAMP stack from x86 to Power using the Server Consolidation Tool Migrating LAMP stack from x86 to Power using the Server Consolidation Tool Naveen N. Rao Lucio J.H. Correia IBM Linux Technology Center November 2014 Version 3.0 1 of 24 Table of Contents 1.Introduction...3

More information

W H I T E P A P E R. Optimized Backup and Recovery for VMware Infrastructure with EMC Avamar

W H I T E P A P E R. Optimized Backup and Recovery for VMware Infrastructure with EMC Avamar W H I T E P A P E R Optimized Backup and Recovery for VMware Infrastructure with EMC Avamar Contents Introduction...1 VMware Infrastructure Overview...1 VMware Consolidated Backup...2 EMC Avamar Overview...3

More information

Understanding Linux on z/vm Steal Time

Understanding Linux on z/vm Steal Time Understanding Linux on z/vm Steal Time June 2014 Rob van der Heij [email protected] Summary Ever since Linux distributions started to report steal time in various tools, it has been causing

More information

User Guide for VMware Adapter for SAP LVM VERSION 1.2

User Guide for VMware Adapter for SAP LVM VERSION 1.2 User Guide for VMware Adapter for SAP LVM VERSION 1.2 Table of Contents Introduction to VMware Adapter for SAP LVM... 3 Product Description... 3 Executive Summary... 3 Target Audience... 3 Prerequisites...

More information

Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent

Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent T R A I N I N G C O U R S E S T H E # 1 L I N U X A N D O P E N S O U R C E P R O V I D E R I N S A U D I A R A B I A Introd uction to Linux Administra tion Adva nce Linux Ad ministrati on Linux Identity

More information

Overview... 2. Customer Login... 2. Main Page... 2. VM Management... 4. Creation... 4 Editing a Virtual Machine... 6

Overview... 2. Customer Login... 2. Main Page... 2. VM Management... 4. Creation... 4 Editing a Virtual Machine... 6 July 2013 Contents Overview... 2 Customer Login... 2 Main Page... 2 VM Management... 4 Creation... 4 Editing a Virtual Machine... 6 Disk Management... 7 Deletion... 7 Power On / Off... 8 Network Management...

More information

RED HAT ENTERPRISE VIRTUALIZATION

RED HAT ENTERPRISE VIRTUALIZATION Giuseppe Paterno' Solution Architect Jan 2010 Red Hat Milestones October 1994 Red Hat Linux June 2004 Red Hat Global File System August 2005 Red Hat Certificate System & Dir. Server April 2006 JBoss April

More information

Cloud Computing with xcat on z/vm 6.3

Cloud Computing with xcat on z/vm 6.3 IBM System z Cloud Computing with xcat on z/vm 6.3 Thang Pham z/vm Development Lab [email protected] Trademarks The following are trademarks of the International Business Machines Corporation in the

More information

Using Red Hat Network Satellite Server to Manage Dell PowerEdge Servers

Using Red Hat Network Satellite Server to Manage Dell PowerEdge Servers Using Red Hat Network Satellite Server to Manage Dell PowerEdge Servers Enterprise Product Group (EPG) Dell White Paper By Todd Muirhead and Peter Lillian July 2004 Contents Executive Summary... 3 Introduction...

More information

Windows Template Creation Guide. How to build your own Windows VM templates for deployment in Cloudturk.

Windows Template Creation Guide. How to build your own Windows VM templates for deployment in Cloudturk. Windows Template Creation Guide How to build your own Windows VM templates for deployment in Cloudturk. TABLE OF CONTENTS 1. Preparing the Server... 2 2. Installing Windows... 3 3. Creating a Template...

More information

virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06

virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06 virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06 SWsoft Virtuozzo 3.5.1 (for Windows) Review 2 Summary 0. Introduction 1. Installation 2. VPSs creation and modification

More information

Oracle Database Scalability in VMware ESX VMware ESX 3.5

Oracle Database Scalability in VMware ESX VMware ESX 3.5 Performance Study Oracle Database Scalability in VMware ESX VMware ESX 3.5 Database applications running on individual physical servers represent a large consolidation opportunity. However enterprises

More information

Virtualization. Michael Tsai 2015/06/08

Virtualization. Michael Tsai 2015/06/08 Virtualization Michael Tsai 2015/06/08 What is virtualization? Let s first look at a video from VMware http://bcove.me/x9zhalcl Problems? Low utilization Different needs DNS DHCP Web mail 5% 5% 15% 8%

More information

FileCruiser Backup & Restoring Guide

FileCruiser Backup & Restoring Guide FileCruiser Backup & Restoring Guide Version: 0.3 FileCruiser Model: VA2600/VR2600 with SR1 Date: JAN 27, 2015 1 Index Index... 2 Introduction... 3 Backup Requirements... 6 Backup Set up... 7 Backup the

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

Best Practices for Deploying and Managing Linux with Red Hat Network

Best Practices for Deploying and Managing Linux with Red Hat Network Best Practices for Deploying and Managing Linux with Red Hat Network Abstract This technical whitepaper provides a best practices overview for companies deploying and managing their open source environment

More information

ServerPronto Cloud User Guide

ServerPronto Cloud User Guide ServerPronto Cloud User Guide Virtual machines Virtual machines are based on templates and are deployed on hypervisors. Hypervisors give them access to CPU, disk and network resources. The ServerPronto

More information

Linux Disaster Recovery best practices with rear

Linux Disaster Recovery best practices with rear Relax and Recover Linux Disaster Recovery best practices with rear Gratien D'haese IT3 Consultants Who am I Independent Unix System Engineer since 1996 Unix user since 1986 Linux user since 1991 Open Source

More information

Over-the-top Upgrade Guide for Snare Server v7

Over-the-top Upgrade Guide for Snare Server v7 Over-the-top Upgrade Guide for Snare Server v7 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for

More information

ESX 4 Patch Management Guide ESX 4.0

ESX 4 Patch Management Guide ESX 4.0 ESX 4 Patch Management Guide ESX 4.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

Converting Linux and Windows Physical and Virtual Machines to Oracle VM Virtual Machines. An Oracle Technical White Paper December 2008

Converting Linux and Windows Physical and Virtual Machines to Oracle VM Virtual Machines. An Oracle Technical White Paper December 2008 Converting Linux and Windows Physical and Virtual Machines to Oracle VM Virtual Machines An Oracle Technical White Paper December 2008 Converting Linux and Windows Physical and Virtual Machines to Oracle

More information

CA ARCserve Family r15

CA ARCserve Family r15 CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales [email protected] The ARCserve Family More than Backup The only solution that: Gives customers control over their changing

More information

IBM Tivoli Storage Manager for Linux Version 7.1.5. Installation Guide IBM

IBM Tivoli Storage Manager for Linux Version 7.1.5. Installation Guide IBM IBM Tivoli Storage Manager for Linux Version 7.1.5 Installation Guide IBM IBM Tivoli Storage Manager for Linux Version 7.1.5 Installation Guide IBM Note: Before you use this information and the product

More information

Virtualization System Security

Virtualization System Security Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability

More information

Configuring Virtual Blades

Configuring Virtual Blades CHAPTER 14 This chapter describes how to configure virtual blades, which are computer emulators that reside in a WAE or WAVE device. A virtual blade allows you to allocate WAE system resources for use

More information